The most extensive identity protection plan available
AGENDA Identity theft About InfoArmor PrivacyArmor coverage Portal walkthrough Q&A
Sharing data is now a fact of daily life. Our work requires personal information. We build relationships through machines. We share more data in more ways every day.
EVERY 60 SECONDS 350,000 tweets 400 hours 210,000 snaps 65,000 posts 243,000 photos
56% of adults don t actively think about the risks of their online activities. 1 1 http://www.pewinternet.org/2014/04/03/older-adults-and-technology-use/
20 M+ PEOPLE ARE MORE CONNECTED THAN EVER BEFORE Amazon Echos sold through Q3 2017 244 M Install base of smart home devices in U.S. by 2022 (24M in 2016) Source: Forrester Data: Smart Home Devices Forecast, 2017 To 2022 (US)
85% of hackers named humans as the biggest security weakness. Source: Blackhat 2017, Hacker Survey Report, 2017
22 % 34 % Denied personal Took time off from work Reported stressrelated sleep disturbances 16.7 Million U.S. victims lines of credit 48 % in 2017 15 % Sold personal Source: the Identity Theft Resource Center s Identity Theft: the Aftermath report Additional Source: Javelin Strategy & Research 2018 Identity Fraud: Protecting Vulnerable Populations possessions to pay for expenses
Identity theft is: Financial accounts opened in your name Credit cards opened in your name Medical care provided in your name Someone arrested provides your personal information Someone uses your Social Security number to file for government services Someone files taxes in your name Someone creates a new identity by combining your information with someone else s (synthetic fraud) Identity theft is not: Fraudulent credit or debit card transactions Public information online Your personal account(s) being sent to collections for lack of payment Scams (phone, email, etc.) Hacked electronics or theft Hacked email *Note: if a victim gives out PII in a scam, or through a hack, this could become identity theft if acted upon
ABOUT US Founded in 2008 Focus on providing identity protection as a benefit A+ rating with Better Business Bureau Our complete focus is on keeping your personal information secure 100% U.S. based 100% Post-remediation satisfaction.5% Identity theft incidence rate among our members, as opposed to a 6.6% national average
Seriously secure SSAE18 SOC 1 and SOC 2 Type 2 accredited, updated annually WORLD-CLASS SECURITY Security is our top priority and a part of everything we do Relentlessly reliable Perfect track record with zero security incidents, and 99.99% site uptime Two-factor authentication For even stronger protection and peace of mind
THE LOGIN PROCESS Why two-factor authentication? It helps us keep your accounts more secure
PORTAL DASHBOARD Alerts sent via email or text message Log in or use our app to address alerts
CREDIT MONITORING Credit Monitoring includes: Credit score Credit report Notifications when we detect credit activity
DARK WEB MONITORING Enter information for credentials like email addresses, driver s licenses, credit cards, passports, and other sensitive information. We ll monitor the dark web and alert you should they become compromised. If you lose your wallet, the stored information allows us to help you replace the lost contents.
FINANCIAL TRANSACTIONS Add financial account information for accounts you would like monitored Default thresholds automatically appear Adjust your thresholds with the dropdowns
DIGITAL EXPOSURE REPORT Generates information from: The searchable internet, i.e. what shows up in Google, Bing, etc. Public records Social media sites Employment sites like CareerBuilder
SOCIAL MONITORING Monitor social accounts for anyone covered We look for alcohol references, bigotry, bullying, sexual connotations, grooming behavior, threats, and more Great feature for families with children who use social media
How to get the most out of PrivacyArmor Activate Credit Monitoring for fully-authenticated alerts Add credentials to Dark Web Monitoring for alerts when things like your email or passwords are compromised Set up financial account monitoring through Financial Transactions Add any enrolled family members Subscribe to text alerts Download our app to address alerts from anywhere
FULL-SERVICE REMEDIATION Training CITRMS (Certified Identity Theft Risk Management Specialist) Industry best practices in identity remediation Security protocols Case management In-house InfoArmor employees Accept all pre-existing conditions Limited Power of Attorney Dedicated Privacy Advocate Persistent creditor and merchant follow-up Alerts via email, text, and phone
PrivacyArmor by InfoArmor Questions? You can reach InfoArmor by calling 800-789-2720 www.infoarmor.com